咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 191 篇 期刊文献

馆藏范围

  • 489 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 316 篇 工学
    • 222 篇 计算机科学与技术...
    • 174 篇 软件工程
    • 82 篇 信息与通信工程
    • 80 篇 电气工程
    • 44 篇 电子科学与技术(可...
    • 41 篇 控制科学与工程
    • 24 篇 网络空间安全
    • 22 篇 光学工程
    • 19 篇 仪器科学与技术
    • 17 篇 生物工程
    • 16 篇 动力工程及工程热...
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 机械工程
    • 12 篇 交通运输工程
    • 12 篇 安全科学与工程
    • 9 篇 建筑学
    • 9 篇 土木工程
  • 140 篇 理学
    • 78 篇 数学
    • 42 篇 物理学
    • 30 篇 统计学(可授理学、...
    • 20 篇 生物学
    • 14 篇 系统科学
    • 11 篇 化学
  • 70 篇 管理学
    • 41 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
  • 15 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 8 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 19 篇 feature extracti...
  • 16 篇 security
  • 15 篇 privacy
  • 14 篇 data privacy
  • 14 篇 data models
  • 14 篇 training
  • 12 篇 protocols
  • 11 篇 semantics
  • 11 篇 encryption
  • 10 篇 deep learning
  • 10 篇 network security
  • 10 篇 federated learni...
  • 9 篇 protection
  • 9 篇 adaptation model...
  • 8 篇 signal processin...
  • 8 篇 optimization
  • 8 篇 data mining
  • 8 篇 differential pri...
  • 8 篇 information secu...
  • 8 篇 blockchain

机构

  • 43 篇 guangdong provin...
  • 39 篇 shandong provinc...
  • 29 篇 shaanxi key labo...
  • 27 篇 key laboratory o...
  • 22 篇 electric power r...
  • 21 篇 shandong fundame...
  • 14 篇 school of comput...
  • 11 篇 quan cheng labor...
  • 10 篇 electric power r...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 collaborative in...
  • 9 篇 school of cyber ...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 guangdong provin...

作者

  • 24 篇 jiang yixin
  • 22 篇 zhang yunan
  • 21 篇 shen yulong
  • 19 篇 xu aidong
  • 18 篇 yixin jiang
  • 16 篇 ma jianfeng
  • 16 篇 yunan zhang
  • 16 篇 yiwei yang
  • 14 篇 kuang xiaoyun
  • 13 篇 zhihong liang
  • 13 篇 liang zhihong
  • 13 篇 aidong xu
  • 13 篇 yang yiwei
  • 12 篇 chao hong
  • 12 篇 jianfeng ma
  • 11 篇 hong chao
  • 11 篇 xiaoyun kuang
  • 11 篇 fu chong
  • 10 篇 zhou xiaoji
  • 10 篇 lin chen

语言

  • 424 篇 英文
  • 52 篇 其他
  • 15 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Shanxi Key Laboratory of Network and System Security"
489 条 记 录,以下是1-10 订阅
排序:
Application and Optimization of Multi-Factor Authentication and Biometric Technology in Power Grid Energy network Access Control
Renewable Energy and Power Quality Journal
收藏 引用
Renewable Energy and Power Quality Journal 2024年 第3期22卷 118-131页
作者: Meng, Jiaxiao Du, Jinyan Liang, Zhihong Yang, Chunyan Jiang, Yixin Electric Power Research Institute CSG Guangdong Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China
With the sudden development in electronic and network technology, the power grid has emerged in several evolved nations and other areas with faster development. Energy storage can enhance the stability, resiliency and... 详细信息
来源: 评论
Training-free Graph Anomaly Detection: A Simple Approach via Singular Value Decomposition  25
Training-free Graph Anomaly Detection: A Simple Approach via...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Zhou, Cheng Li, Guangxia Weng, Hao Xiang, Yiyu Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China
Graph anomaly detection (GAD) is essential for identifying irregular behavior within graphs. Recent advances in GAD rely on deep learning techniques and have shown promise. However, prior deep learning-based GAD metho... 详细信息
来源: 评论
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
Locally differentially private high-dimensional data synthesis
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 25-42页
作者: Xue CHEN Cheng WANG Qing YANG Teng HU Changjun JIANG Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University
In local differential privacy(LDP), a challenging problem is the ability to generate highdimensional data while efficiently capturing the correlation between attributes in a dataset. Existing solutions for low-dimensi... 详细信息
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering  6
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
6th International Conference on Frontier Technologies of Information and Computer, ICFTIC 2024
作者: Qi, Mengshi Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints  6
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
6th International Conference on Frontier Technologies of Information and Computer, ICFTIC 2024
作者: Li, Duanzhen Xu, Shujiang He, Haochen Xue, Hongrui Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
STGAN: Detecting Host Threats via Fusion of Spatial-Temporal Features in Host Provenance Graphs  25
STGAN: Detecting Host Threats via Fusion of Spatial-Temporal...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Sang, Anyuan Fan, Xuezheng Yang, Li Wang, Yuchen Zhou, Lu Jia, Junbo Yang, Huipeng Xidian University Xi’an China Xidian University Shaanxi Key Laboratory of Network and System Security Xi’an China
As the complexity and frequency of cyberattacks, such as Advanced Persistent Threats (APTs) and ransomware, continue to escalate, traditional anomaly detection methods have proven inadequate in addressing these sophis... 详细信息
来源: 评论
Atomic transport dynamics in crossed optical dipole trap
收藏 引用
Chinese Physics B 2024年 第7期33卷 293-301页
作者: 彭鹏 张正熙 樊耀塬 殷国玲 毛德凯 陈徐宗 熊炜 周小计 State Key Laboratory of Advanced Optical Communication System and Network School of ElectronicsPeking UniversityBeijing 100871China Institute of Carbon-based Thin Film Electronics Peking UniversityTaiyuan 030012China State Key Laboratory of Quantum Optics and Quantum Optics Devices Institute of Opto-ElectronicsShanxi UniversityTaiyuan 030006China
We study the dynamical evolution of cold atoms in crossed optical dipole trap theoretically and experimentally. The atomic transport process is accompanied by two competitive kinds of physical mechanics, atomic loadin... 详细信息
来源: 评论
The Study of Multi-type Computing Power Trading Mechanism in Computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
Gigahertz frequency hopping in an optical phase-locked loop for Raman lasers
收藏 引用
Chinese Physics B 2024年 第2期33卷 60-65页
作者: 毛德凯 税鸿冕 殷国玲 彭鹏 王春唯 周小计 State Key Laboratory of Advanced Optical Communication System and Network School of ElectronicsPeking UniversityBeijing 100871China Institute of Carbon-based Thin Film Electronics Peking UniversityTaiyuan 030012China State Key Laboratory of Quantum Optics and Quantum Optics Devices Institute of Opto-ElectronicsShanxi UniversityTaiyuan 030006China Institute of Advanced Functional Materials and Devices Shanxi UniversityTaiyuan 030031China
Raman lasers are essential in atomic physics,and the development of portable devices has posed requirements for time-division multiplexing of Raman *** demonstrate an innovative gigahertz frequency hopping approach of... 详细信息
来源: 评论